* [PATCH 0/6] ARM: k3: updates
@ 2025-08-14 10:46 Sascha Hauer
2025-08-14 10:46 ` [PATCH 1/6] ARM: k3: AM62l3-EVM: add usb0 Sascha Hauer
` (5 more replies)
0 siblings, 6 replies; 7+ messages in thread
From: Sascha Hauer @ 2025-08-14 10:46 UTC (permalink / raw)
To: BAREBOX
This contains assorted patches for the K3 architecture.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
Sascha Hauer (6):
ARM: k3: AM62l3-EVM: add usb0
ARM: k3: quote PEM files
ARM: k3: allow to pass custom signing keys
k3img: handle PKCS#11 uris
ARM: K3: Update yaml files for AM62L
ARM: k3: use newer ti-linux-firmware
arch/arm/dts/k3-am62l3-evm.dts | 47 ++++
arch/arm/mach-k3/Kconfig | 22 ++
arch/arm/mach-k3/Makefile | 2 +-
arch/arm/mach-k3/board-cfg-am62l.yaml | 32 +++
arch/arm/mach-k3/schema-am62l.yaml | 427 ++++++++++++++++++++++++++++++++++
arch/arm/mach-k3/sec-cfg-am62l.yaml | 131 +++++------
firmware/ti-linux-firmware | 2 +-
images/Makefile.k3 | 14 +-
scripts/k3img | 6 +-
9 files changed, 610 insertions(+), 73 deletions(-)
---
base-commit: a353f75968e07fcdf43c862e4e00856629c67c32
change-id: 20250814-k3-am62l-updates-5d71a474e900
Best regards,
--
Sascha Hauer <s.hauer@pengutronix.de>
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH 1/6] ARM: k3: AM62l3-EVM: add usb0
2025-08-14 10:46 [PATCH 0/6] ARM: k3: updates Sascha Hauer
@ 2025-08-14 10:46 ` Sascha Hauer
2025-08-14 10:46 ` [PATCH 2/6] ARM: k3: quote PEM files Sascha Hauer
` (4 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: Sascha Hauer @ 2025-08-14 10:46 UTC (permalink / raw)
To: BAREBOX
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
arch/arm/dts/k3-am62l3-evm.dts | 47 ++++++++++++++++++++++++++++++++++++++++++
1 file changed, 47 insertions(+)
diff --git a/arch/arm/dts/k3-am62l3-evm.dts b/arch/arm/dts/k3-am62l3-evm.dts
index bb1e3a891c3847cb6cbb458810a8decca779c845..921b58cad2f00b6026143f9955c6811fa31c7579 100644
--- a/arch/arm/dts/k3-am62l3-evm.dts
+++ b/arch/arm/dts/k3-am62l3-evm.dts
@@ -205,6 +205,31 @@ exp2: gpio@23 {
};
};
+&i2c2 {
+ status = "okay";
+ pinctrl-names = "default";
+ pinctrl-0 = <&i2c2_pins_default>;
+ clock-frequency = <400000>;
+
+ typec_pd0: tps6598x@3f {
+ compatible = "ti,tps6598x";
+ reg = <0x3f>;
+
+ connector {
+ compatible = "usb-c-connector";
+ label = "USB-C";
+ self-powered;
+ data-role = "dual";
+ power-role = "sink";
+ port {
+ usb_con_hs: endpoint {
+ remote-endpoint = <&usb0_hs_ep>;
+ };
+ };
+ };
+ };
+};
+
&pmx0 {
gpio0_ioexp_intr_pins_default: gpio0-ioexp-intr-default-pins {
pinctrl-single,pins = <
@@ -228,6 +253,13 @@ AM62LX_IOPAD(0x01d8, PIN_INPUT_PULLUP, 0) /* (A6) I2C1_SDA */
>;
};
+ i2c2_pins_default: i2c2-default-pins {
+ pinctrl-single,pins = <
+ AM62LX_IOPAD(0x01dc, PIN_INPUT_PULLUP, 0) /* (B8) I2C2_SCL */
+ AM62LX_IOPAD(0x01e0, PIN_INPUT_PULLUP, 0) /* (D8) I2C2_SDA */
+ >;
+ };
+
mmc0_pins_default: mmc0-default-pins {
pinctrl-single,pins = <
AM62LX_IOPAD(0x0214, PIN_INPUT_PULLUP, 0) /* (D2) MMC0_CMD */
@@ -376,3 +408,18 @@ &usbss1 {
ti,vbus-divider;
status = "okay";
};
+
+&usb0 {
+ usb-role-switch;
+
+ port {
+ usb0_hs_ep: endpoint {
+ remote-endpoint = <&usb_con_hs>;
+ };
+ };
+};
+
+&usbss0 {
+ ti,vbus-divider;
+ status = "okay";
+};
--
2.39.5
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH 2/6] ARM: k3: quote PEM files
2025-08-14 10:46 [PATCH 0/6] ARM: k3: updates Sascha Hauer
2025-08-14 10:46 ` [PATCH 1/6] ARM: k3: AM62l3-EVM: add usb0 Sascha Hauer
@ 2025-08-14 10:46 ` Sascha Hauer
2025-08-14 10:46 ` [PATCH 3/6] ARM: k3: allow to pass custom signing keys Sascha Hauer
` (3 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: Sascha Hauer @ 2025-08-14 10:46 UTC (permalink / raw)
To: BAREBOX
In future we'll be able to pass PKCS#11 uris instead of PEM files to the
k3 image tool. As these may contain semicolons quote the PEM files to
pass the uris properly to the shell.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
images/Makefile.k3 | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/images/Makefile.k3 b/images/Makefile.k3
index 55c14d9da7136953c91fa4abbc1c88936a7efdb7..0024cefa3687778487749f39b1c5bb57d490ec10 100644
--- a/images/Makefile.k3
+++ b/images/Makefile.k3
@@ -96,7 +96,7 @@ quiet_cmd_k3_am62x_image = K3_am62x_IMG $@
$(SYSFWDATA_$(@F)):18:0:0:00067000 \
$$inner \
$(DMDATA_$(@F)):17:16:0:43c3a800 \
- --key $(KEY_$(@F)) --out $@
+ --key "$(KEY_$(@F))" --out $@
quiet_cmd_k3_am62lx_image = K3_am62lx_IMG $@
cmd_k3_am62lx_image = \
@@ -115,7 +115,7 @@ quiet_cmd_k3_am62lx_image = K3_am62lx_IMG $@
$$inner \
$$optee \
$<:17:16:0:82000000 \
- --key $(KEY_$(@F)) --out $@
+ --key "$(KEY_$(@F))" --out $@
quiet_cmd_k3_am62lx_tiboot3_image = K3_am62lx_tiboot3_IMG $@
cmd_k3_am62lx_tiboot3_image = \
@@ -124,7 +124,7 @@ quiet_cmd_k3_am62lx_tiboot3_image = K3_am62lx_tiboot3_IMG $@
$(SYSFW_$(@F)):2:0:0:00040000 \
$(SYSFWDATA_$(@F)):18:0:0:0006c000 \
$(INNERDATA_$(@F)):3:0:0:00000000 \
- --key $(KEY_$(@F)) \
+ --key "$(KEY_$(@F))" \
--out $@
$(obj)/%.k3_am62x_img: $(obj)/% scripts/k3img FORCE
--
2.39.5
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH 3/6] ARM: k3: allow to pass custom signing keys
2025-08-14 10:46 [PATCH 0/6] ARM: k3: updates Sascha Hauer
2025-08-14 10:46 ` [PATCH 1/6] ARM: k3: AM62l3-EVM: add usb0 Sascha Hauer
2025-08-14 10:46 ` [PATCH 2/6] ARM: k3: quote PEM files Sascha Hauer
@ 2025-08-14 10:46 ` Sascha Hauer
2025-08-14 10:46 ` [PATCH 4/6] k3img: handle PKCS#11 uris Sascha Hauer
` (2 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: Sascha Hauer @ 2025-08-14 10:46 UTC (permalink / raw)
To: BAREBOX
By default the AM62x images are signed with default TI development keys.
Allow to sign the images with custom keys for future secure boot.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
arch/arm/mach-k3/Kconfig | 22 ++++++++++++++++++++++
images/Makefile.k3 | 4 ++++
2 files changed, 26 insertions(+)
diff --git a/arch/arm/mach-k3/Kconfig b/arch/arm/mach-k3/Kconfig
index 338421a8af1715c72a23adc41fb7a21d69091585..281068071e4ef617f5fe5006b225428c7e2d17c1 100644
--- a/arch/arm/mach-k3/Kconfig
+++ b/arch/arm/mach-k3/Kconfig
@@ -66,4 +66,26 @@ config ARCH_K3_COMMAND_AUTHENTICATE
Add k3_authenticate_image command to test authenticating images
against the K3 ROM API.
+choice
+ prompt "Select signing key"
+ default ARCH_K3_SIGNING_KEY_TI_DEVEL
+
+config ARCH_K3_SIGNING_KEY_TI_DEVEL
+ bool "Use TI devel key for signing (arch/arm/mach-k3/custMpk.pem)"
+ help
+ Use the TI provided devel key for signing the bootable certificates
+
+config ARCH_K3_SIGNING_KEY_CUSTOM
+ bool "Specify custom key for signing"
+ help
+ Use custom keys for signing the bootable certificates
+
+endchoice
+
+config ARCH_K3_SIGNING_KEY
+ string "Signing key"
+ depends on ARCH_K3_SIGNING_KEY_CUSTOM
+ help
+ Path or PKS#11 uri for the signing keys
+
endmenu
diff --git a/images/Makefile.k3 b/images/Makefile.k3
index 0024cefa3687778487749f39b1c5bb57d490ec10..05b645f6d48b0594eec2af1208825c1d551a1dff 100644
--- a/images/Makefile.k3
+++ b/images/Makefile.k3
@@ -17,7 +17,11 @@ image-$(CONFIG_MACH_BEAGLEPLAY) += barebox-beagleplay.img
endif
+ifdef CONFIG_ARCH_K3_SIGNING_KEY_TI_DEVEL
KEY_custmpk=$(srctree)/arch/arm/mach-k3/custMpk.pem
+else
+KEY_custmpk="$(CONFIG_ARCH_K3_SIGNING_KEY)"
+endif
KEY_degenerate=$(srctree)/arch/arm/mach-k3/ti-degenerate-key.pem
ifdef CONFIG_MACH_K3_CORTEX_R5
--
2.39.5
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH 4/6] k3img: handle PKCS#11 uris
2025-08-14 10:46 [PATCH 0/6] ARM: k3: updates Sascha Hauer
` (2 preceding siblings ...)
2025-08-14 10:46 ` [PATCH 3/6] ARM: k3: allow to pass custom signing keys Sascha Hauer
@ 2025-08-14 10:46 ` Sascha Hauer
2025-08-14 10:46 ` [PATCH 5/6] ARM: K3: Update yaml files for AM62L Sascha Hauer
2025-08-14 10:46 ` [PATCH 6/6] ARM: k3: use newer ti-linux-firmware Sascha Hauer
5 siblings, 0 replies; 7+ messages in thread
From: Sascha Hauer @ 2025-08-14 10:46 UTC (permalink / raw)
To: BAREBOX
In case the keys passed to k3img are PKCS#11 uris we have to set the
keyform/engine options for openssl.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
scripts/k3img | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/scripts/k3img b/scripts/k3img
index 4242c505d07513d915797a9b68faae9310506a0c..bd86a437898de7c3980b61bceffbd973d6b9f3d8 100755
--- a/scripts/k3img
+++ b/scripts/k3img
@@ -143,6 +143,10 @@ EndOfHereDocument
cat $ext_boot_info $components >> $certcfg
-openssl req -new -x509 -key $key -nodes -outform DER -out $cert -config $certcfg -sha512
+case $key in pkcs11:*)
+ PKCS11OPTS="-engine pkcs11 -keyform engine"
+esac
+
+openssl req ${PKCS11OPTS} -new -x509 -key "${key}" -nodes -outform DER -out "${cert}" -config "${certcfg}" -sha512
cat $cert $data > $out
--
2.39.5
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH 5/6] ARM: K3: Update yaml files for AM62L
2025-08-14 10:46 [PATCH 0/6] ARM: k3: updates Sascha Hauer
` (3 preceding siblings ...)
2025-08-14 10:46 ` [PATCH 4/6] k3img: handle PKCS#11 uris Sascha Hauer
@ 2025-08-14 10:46 ` Sascha Hauer
2025-08-14 10:46 ` [PATCH 6/6] ARM: k3: use newer ti-linux-firmware Sascha Hauer
5 siblings, 0 replies; 7+ messages in thread
From: Sascha Hauer @ 2025-08-14 10:46 UTC (permalink / raw)
To: BAREBOX
The yaml files for configuring the boot images need to be different on
AM62x/AM62L. Without it for example the fuses can't be read. These yaml
files are now based on TI U-Boot 11.01.07
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
arch/arm/mach-k3/Makefile | 2 +-
arch/arm/mach-k3/board-cfg-am62l.yaml | 32 +++
arch/arm/mach-k3/schema-am62l.yaml | 427 ++++++++++++++++++++++++++++++++++
arch/arm/mach-k3/sec-cfg-am62l.yaml | 131 +++++------
4 files changed, 526 insertions(+), 66 deletions(-)
diff --git a/arch/arm/mach-k3/Makefile b/arch/arm/mach-k3/Makefile
index df77832887e992de934623d0a3384ab82454e2cc..c9edde63c143cabfe02167961f83528938d97112 100644
--- a/arch/arm/mach-k3/Makefile
+++ b/arch/arm/mach-k3/Makefile
@@ -22,7 +22,7 @@ $(obj)/combined-sysfw-cfg-am62x.k3cfg: $(srctree)/arch/arm/mach-k3/schema.yaml \
FORCE
$(call if_changed,k3_cfg)
-$(obj)/combined-sysfw-cfg-am62l.k3cfg: $(srctree)/arch/arm/mach-k3/schema.yaml \
+$(obj)/combined-sysfw-cfg-am62l.k3cfg: $(srctree)/arch/arm/mach-k3/schema-am62l.yaml \
$(obj)/board-cfg-am62x.yaml \
$(obj)/sec-cfg-am62l.yaml \
FORCE
diff --git a/arch/arm/mach-k3/board-cfg-am62l.yaml b/arch/arm/mach-k3/board-cfg-am62l.yaml
new file mode 100644
index 0000000000000000000000000000000000000000..a0297c284a67539d4984ab0486011cc2a853bfc5
--- /dev/null
+++ b/arch/arm/mach-k3/board-cfg-am62l.yaml
@@ -0,0 +1,32 @@
+# SPDX-License-Identifier: GPL-2.0+
+# Copyright (C) 2025 Texas Instruments Incorporated - https://www.ti.com/
+#
+# Board configuration for the emulated AM62Lx
+#
+---
+board-cfg:
+ rev:
+ boardcfg_abi_maj: 0x0
+ boardcfg_abi_min: 0x1
+
+ control:
+ subhdr:
+ magic: 0xC1D3
+ size: 7
+ main_isolation_enable: 0x5A
+ main_isolation_hostid: 0x2
+
+ bm_writer_cfg:
+ subhdr:
+ magic: 0x7D8A
+ size: 5
+ allowed_host: 10
+
+ reserved: [0, 0, 0, 0, 0, 0, 0]
+
+ debug_cfg:
+ subhdr:
+ magic: 0x020C
+ size: 8
+ trace_dst_enables: 0x00
+ trace_src_enables: 0x00
diff --git a/arch/arm/mach-k3/schema-am62l.yaml b/arch/arm/mach-k3/schema-am62l.yaml
new file mode 100644
index 0000000000000000000000000000000000000000..6c7cc78f0179ddaf9e9ec0665214f49ce7bc6ce1
--- /dev/null
+++ b/arch/arm/mach-k3/schema-am62l.yaml
@@ -0,0 +1,427 @@
+# SPDX-License-Identifier: GPL-2.0-only OR MIT
+#
+# Copyright (C) 2025 Texas Instruments Incorporated - https://www.ti.com/
+#
+# Config schema for TI AM62L devices
+#
+
+---
+
+definitions:
+ u8:
+ type: integer
+ minimum: 0
+ maximum: 0xff
+ u16:
+ type: integer
+ minimum: 0
+ maximum: 0xffff
+ u32:
+ type: integer
+ minimum: 0
+ maximum: 0xffffffff
+
+
+
+type: object
+properties:
+ pm-cfg:
+ type: object
+ properties:
+ rev:
+ type: object
+ properties:
+ boardcfg_abi_maj:
+ $ref: "#/definitions/u8"
+ boardcfg_abi_min:
+ $ref: "#/definitions/u8"
+ board-cfg:
+ type: object
+ properties:
+ rev:
+ type: object
+ properties:
+ boardcfg_abi_maj:
+ $ref: "#/definitions/u8"
+ boardcfg_abi_min:
+ $ref: "#/definitions/u8"
+ control:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ main_isolation_enable:
+ $ref: "#/definitions/u8"
+ main_isolation_hostid:
+ $ref: "#/definitions/u16"
+
+ bm_writer_cfg:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ allowed_host:
+ $ref : "#/definitions/u8"
+
+ reserved:
+ type: array
+ minItems: 7
+ maxItems: 7
+ items:
+ $ref: "#/definitions/u8"
+
+ debug_cfg:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ trace_dst_enables:
+ $ref: "#/definitions/u16"
+ trace_src_enables:
+ $ref: "#/definitions/u16"
+
+ sec-cfg:
+ type: object
+ properties:
+ rev:
+ type: object
+ properties:
+ boardcfg_abi_maj:
+ $ref: "#/definitions/u8"
+ boardcfg_abi_min:
+ $ref: "#/definitions/u8"
+
+ processor_acl_list:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ proc_acl_entries:
+ type: array
+ minItems: 32
+ maxItems: 32
+ items:
+ type: object
+ properties:
+ processor_id:
+ $ref: "#/definitions/u8"
+ proc_access_master:
+ $ref: "#/definitions/u8"
+ proc_access_secondary:
+ type: array
+ minItems: 3
+ maxItems: 3
+ items:
+ $ref: "#/definitions/u8"
+ host_hierarchy:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ host_hierarchy_entries:
+ type: array
+ minItems: 32
+ maxItems: 32
+ items:
+ type: object
+ properties:
+ host_id:
+ $ref: "#/definitions/u8"
+ supervisor_host_id:
+ $ref: "#/definitions/u8"
+
+ otp_config:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ otp_entry:
+ type: array
+ minItems: 32
+ maxItems: 32
+ items:
+ type: object
+ properties:
+ host_id:
+ $ref: "#/definitions/u8"
+ host_perms:
+ $ref: "#/definitions/u8"
+ write_host_id:
+ $ref: "#/definitions/u8"
+
+ dkek_config:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ allowed_hosts:
+ type: array
+ minItems: 4
+ maxItems: 4
+ items:
+ $ref: "#/definitions/u8"
+ allow_dkek_export_tisci:
+ $ref: "#/definitions/u8"
+ rsvd:
+ type: array
+ minItems: 3
+ maxItems: 3
+ items:
+ $ref: "#/definitions/u8"
+
+ sa2ul_cfg:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ rsvd:
+ type: array
+ minItems: 2
+ maxItems: 4
+ items:
+ $ref: "#/definitions/u8"
+ enable_saul_psil_global_config_writes:
+ $ref: "#/definitions/u8"
+ auth_resource_owner:
+ $ref: "#/definitions/u8"
+
+ sec_dbg_config:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ allow_jtag_unlock:
+ $ref: "#/definitions/u8"
+ allow_wildcard_unlock:
+ $ref: "#/definitions/u8"
+ allowed_debug_level_rsvd:
+ $ref: "#/definitions/u8"
+ rsvd:
+ $ref: "#/definitions/u8"
+ min_cert_rev:
+ $ref: "#/definitions/u32"
+ jtag_unlock_hosts:
+ type: array
+ minItems: 4
+ maxItems: 4
+ items:
+ $ref: "#/definitions/u8"
+
+
+ sec_handover_cfg:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ handover_msg_sender:
+ $ref: "#/definitions/u8"
+ handover_to_host_id:
+ $ref: "#/definitions/u8"
+ rsvd:
+ type: array
+ minItems: 4
+ maxItems: 4
+ items:
+ $ref: "#/definitions/u8"
+
+ rm-cfg:
+ type: object
+ properties:
+ rm_boardcfg:
+ type: object
+ properties:
+ rev:
+ type: object
+ properties:
+ boardcfg_abi_maj:
+ $ref: "#/definitions/u8"
+ boardcfg_abi_min:
+ $ref: "#/definitions/u8"
+
+ host_cfg:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ host_cfg_entries:
+ type: array
+ minItems: 0
+ maxItems: 32
+ items:
+ type: object
+ properties:
+ host_id:
+ $ref: "#/definitions/u8"
+ allowed_atype:
+ $ref: "#/definitions/u8"
+ allowed_qos:
+ $ref: "#/definitions/u16"
+ allowed_orderid:
+ $ref: "#/definitions/u32"
+ allowed_priority:
+ $ref: "#/definitions/u16"
+ allowed_sched_priority:
+ $ref: "#/definitions/u8"
+ resasg:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ resasg_entries_size:
+ $ref: "#/definitions/u16"
+ reserved:
+ $ref: "#/definitions/u16"
+
+ resasg_entries:
+ type: array
+ minItems: 0
+ maxItems: 468
+ items:
+ type: object
+ properties:
+ start_resource:
+ $ref: "#/definitions/u16"
+ num_resource:
+ $ref: "#/definitions/u16"
+ type:
+ $ref: "#/definitions/u16"
+ host_id:
+ $ref: "#/definitions/u8"
+ reserved:
+ $ref: "#/definitions/u8"
+
+ tifs-rm-cfg:
+ type: object
+ properties:
+ rm_boardcfg:
+ type: object
+ properties:
+ rev:
+ type: object
+ properties:
+ boardcfg_abi_maj:
+ $ref: "#/definitions/u8"
+ boardcfg_abi_min:
+ $ref: "#/definitions/u8"
+
+ host_cfg:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ host_cfg_entries:
+ type: array
+ minItems: 0
+ maxItems: 32
+ items:
+ type: object
+ properties:
+ host_id:
+ $ref: "#/definitions/u8"
+ allowed_atype:
+ $ref: "#/definitions/u8"
+ allowed_qos:
+ $ref: "#/definitions/u16"
+ allowed_orderid:
+ $ref: "#/definitions/u32"
+ allowed_priority:
+ $ref: "#/definitions/u16"
+ allowed_sched_priority:
+ $ref: "#/definitions/u8"
+ resasg:
+ type: object
+ properties:
+ subhdr:
+ type: object
+ properties:
+ magic:
+ $ref: "#/definitions/u16"
+ size:
+ $ref: "#/definitions/u16"
+ resasg_entries_size:
+ $ref: "#/definitions/u16"
+ reserved:
+ $ref: "#/definitions/u16"
+
+ resasg_entries:
+ type: array
+ minItems: 0
+ maxItems: 468
+ items:
+ type: object
+ properties:
+ start_resource:
+ $ref: "#/definitions/u16"
+ num_resource:
+ $ref: "#/definitions/u16"
+ type:
+ $ref: "#/definitions/u16"
+ host_id:
+ $ref: "#/definitions/u8"
+ reserved:
+ $ref: "#/definitions/u8"
diff --git a/arch/arm/mach-k3/sec-cfg-am62l.yaml b/arch/arm/mach-k3/sec-cfg-am62l.yaml
index bea6891eda249e236b2057cc1e6758de2c47016d..30511ed72b1f96c49adfbb3f672a9935bcb20c80 100644
--- a/arch/arm/mach-k3/sec-cfg-am62l.yaml
+++ b/arch/arm/mach-k3/sec-cfg-am62l.yaml
@@ -9,6 +9,7 @@ sec-cfg:
rev:
boardcfg_abi_maj: 0x0
boardcfg_abi_min: 0x1
+
processor_acl_list:
subhdr:
magic: 0xF1EA
@@ -250,102 +251,102 @@ sec-cfg:
size: 69
otp_entry:
- # 1
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 2
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 3
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 4
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 5
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 6
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 7
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 8
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 9
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 10
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 11
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 12
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 13
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 14
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 15
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 16
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 17
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 18
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 19
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 20
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 21
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 22
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 23
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 24
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 25
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 26
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 27
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 28
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 29
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 30
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 31
- host_id: 0
- host_perms: 0
+ host_id: 10
+ host_perms: 2
- # 32
- host_id: 0
- host_perms: 0
- write_host_id: 0
+ host_id: 10
+ host_perms: 2
+ write_host_id: 10
dkek_config:
subhdr:
magic: 0x5170
--
2.39.5
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH 6/6] ARM: k3: use newer ti-linux-firmware
2025-08-14 10:46 [PATCH 0/6] ARM: k3: updates Sascha Hauer
` (4 preceding siblings ...)
2025-08-14 10:46 ` [PATCH 5/6] ARM: K3: Update yaml files for AM62L Sascha Hauer
@ 2025-08-14 10:46 ` Sascha Hauer
5 siblings, 0 replies; 7+ messages in thread
From: Sascha Hauer @ 2025-08-14 10:46 UTC (permalink / raw)
To: BAREBOX
In ti-linux-firmware 11.00.14 ti-fs-firmware-am62lx-hs-fs-enc.bin is
renamed to ti-fs-firmware-am62lx-hs-enc.bin and
ti-fs-firmware-am62lx-hs-fs-cert.bin is renamed to
ti-fs-firmware-am62lx-hs-cert.bin.
Switch to the newer firmware and update the submodule accordingly.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
---
firmware/ti-linux-firmware | 2 +-
images/Makefile.k3 | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/firmware/ti-linux-firmware b/firmware/ti-linux-firmware
index 10257543a029cc608c9df1c36c83e36ac3dd5b46..f59a711599249ecac75fea38b7a15ef9137d650d 160000
--- a/firmware/ti-linux-firmware
+++ b/firmware/ti-linux-firmware
@@ -1 +1 @@
-Subproject commit 10257543a029cc608c9df1c36c83e36ac3dd5b46
+Subproject commit f59a711599249ecac75fea38b7a15ef9137d650d
diff --git a/images/Makefile.k3 b/images/Makefile.k3
index 05b645f6d48b0594eec2af1208825c1d551a1dff..1a8bfe641a8efc7d4a4a89bb8cd9f6ee3b13adb1 100644
--- a/images/Makefile.k3
+++ b/images/Makefile.k3
@@ -66,8 +66,8 @@ image-$(CONFIG_MACH_BEAGLEPLAY) += barebox-beagleplay-r5.img
endif
SYSFWDATA_am62lx=$(objtree)/arch/arm/mach-k3/combined-sysfw-cfg-am62l.k3cfg
-SYSFW_am62lx_hs_fs=$(FIRMWARE_DIR)/ti-linux-firmware/ti-sysfw/ti-fs-firmware-am62lx-hs-fs-enc.bin
-INNERDATA_am62lx=$(FIRMWARE_DIR)/ti-linux-firmware/ti-sysfw/ti-fs-firmware-am62lx-hs-fs-cert.bin
+SYSFW_am62lx_hs_fs=$(FIRMWARE_DIR)/ti-linux-firmware/ti-sysfw/ti-fs-firmware-am62lx-hs-enc.bin
+INNERDATA_am62lx=$(FIRMWARE_DIR)/ti-linux-firmware/ti-sysfw/ti-fs-firmware-am62lx-hs-cert.bin
## TI am62lx-EVM ##
SYSFW_start_am62lx_evm.pblb.k3_am62lx_img=$(SYSFW_am62lx_hs_fs)
--
2.39.5
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2025-08-14 15:37 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2025-08-14 10:46 [PATCH 0/6] ARM: k3: updates Sascha Hauer
2025-08-14 10:46 ` [PATCH 1/6] ARM: k3: AM62l3-EVM: add usb0 Sascha Hauer
2025-08-14 10:46 ` [PATCH 2/6] ARM: k3: quote PEM files Sascha Hauer
2025-08-14 10:46 ` [PATCH 3/6] ARM: k3: allow to pass custom signing keys Sascha Hauer
2025-08-14 10:46 ` [PATCH 4/6] k3img: handle PKCS#11 uris Sascha Hauer
2025-08-14 10:46 ` [PATCH 5/6] ARM: K3: Update yaml files for AM62L Sascha Hauer
2025-08-14 10:46 ` [PATCH 6/6] ARM: k3: use newer ti-linux-firmware Sascha Hauer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox